Patents by Inventor Gayathri Krishnamurthy

Gayathri Krishnamurthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9336393
    Abstract: An electronic device includes a security system which provides for protection of designated files stored on an electronic device. For example, an electronic device may receive user input selecting a file for protection processing. The user input may select the file for encryption and automatic decryption under certain predetermined conditions and/or for automatic saving to a remote storage device after the device has been reported stolen, for instance. After receiving the user input selecting the file for protection processing, the electronic device may automatically receive theft information from a remote server, wherein the theft information indicates whether the electronic device has been reported stolen. After determining whether the electronic device has been reported stolen, the electronic device may automatically process the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen.
    Type: Grant
    Filed: October 12, 2010
    Date of Patent: May 10, 2016
    Assignee: Softex Incorporated
    Inventors: Apurva M. Bhansali, Gayathri Krishnamurthy Iyer, Mehul R. Patel, Rayesh K. Raikar, Kamal M. Dhanani, Ranjit Kapila, Elza A. Varghese
  • Publication number: 20110072520
    Abstract: An electronic device includes a security system which provides for protection of designated files stored on an electronic device. For example, an electronic device may receive user input selecting a file for protection processing. The user input may select the file for encryption and automatic decryption under certain predetermined conditions and/or for automatic saving to a remote storage device after the device has been reported stolen, for instance. After receiving the user input selecting the file for protection processing, the electronic device may automatically receive theft information from a remote server, wherein the theft information indicates whether the electronic device has been reported stolen. After determining whether the electronic device has been reported stolen, the electronic device may automatically process the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen.
    Type: Application
    Filed: October 12, 2010
    Publication date: March 24, 2011
    Applicant: Softex Incorporated
    Inventors: Apurva M. Bhansali, Manoj K. Jain, Shradha Dube, Gayathri Krishnamurthy Iyer, Mehul R. Patel, Rayesh K. Raikar, Kamal M. Dhanani, Ranjit Kapila, Elza A. Varghese, Thomas D. Tucker
  • Patent number: 7062762
    Abstract: The present invention provides methods specifically geared to finding natural splits in wide, nearly symmetric dependence graphs and assigning the components of the split to clusters in a VLIW processor. The basic approach of these methods is to assign a node n of the dependence graph to the cluster to which it has the strongest affinity. A node n has the strongest affinity to the cluster containing its closest common ancestor node. Then, the mirror image node or nodes of the node n are located if they are present in the graph and are assigned to other clusters in the processor to which they have the strongest affinity.
    Type: Grant
    Filed: December 12, 2002
    Date of Patent: June 13, 2006
    Assignee: Texas Instruments Incorporated
    Inventors: Gayathri Krishnamurthy, Elana D. Granston, Eric J. Stotzer
  • Publication number: 20030135724
    Abstract: The present invention provides methods specifically geared to finding natural splits in wide, nearly symmetric dependence graphs and assigning the components of the split to clusters in a VLIW processor. The basic approach of these methods is to assign a node n of the dependence graph to the cluster to which it has the strongest affinity. A node n has the strongest affinity to the cluster containing its closest common ancestor node. Then, the mirror image node or nodes of the node n are located if they are present in the graph and are assigned to other clusters in the processor to which they have the strongest affinity.
    Type: Application
    Filed: December 12, 2002
    Publication date: July 17, 2003
    Inventors: Gayathri Krishnamurthy, Elana D. Granston, Eric J. Stotzer
  • Publication number: 20030070069
    Abstract: A pluggable authentication module (PAM) is designed for compatibility with a receiver component. In response to a request for a protected web resource, the receiver component receives a user identification (user ID) from a secure and trusted source; the receiver component need not receive a password corresponding to the user ID. The receiver component generates and sends a login request to the PAM for authentication of the user. The login request contains a representation of the user ID, but is void of a corresponding user password. The receiver component and the PAM perform a trust establishment protocol that enables the PAM to determine whether the login request (and the received user ID) is legitimate.
    Type: Application
    Filed: October 10, 2001
    Publication date: April 10, 2003
    Inventors: Abhijit Belapurkar, Gayathri Krishnamurthy, Maneesh Bhandari
  • Publication number: 20030065956
    Abstract: A data communication technique facilitates the transmission of a data element in a trusted manner such that the receiver component can trust that the data element was not modified during the transmission. In addition, the receiver component is assured that the data element could only have been transmitted by a particular sender component. The data communication technique utilizes a challenge-response routine that ensures data integrity and non-repudiation. The data element is sent from the sender component to the receiver component during the challenge-response routine; in accordance with the example embodiment, the hashed response generated by the sender component is based upon the data element. The data communication technique can be implemented in the context of a single sign-on protocol that allows an authenticated user of a linking site to access protected resources associated with a linked web site without having to separately login to the linked web site.
    Type: Application
    Filed: September 28, 2001
    Publication date: April 3, 2003
    Inventors: Abhijit Belapurkar, Gayathri Krishnamurthy, Abdul Rafman Azeez